In today's cybersecurity landscape, many breaches go undetected by traditional security measures that purely hunt for threats based on IOCs such as hashes, IPs and domains. To effectively address this challenge, organizations need to adopt a proactive approach that involves hunting for threats based on the Tactics, Techniques and Procedures (TTPs) that threat actor’s use. TTPs are a more reliable way to identify adversary behavior as indicators such as hashes, IPs and domains are easy to change.
In this workshop, participants learn how to use Fortinet analytics products to hunt for threats using TTPs.
Participants will assume the role of a security analyst and be asked to identify any undetected threats on AcmeCorp's network. To do this they will make use of MITRE ATT&CK™, which is a knowledge base of adversary behavior based on real-world observations.
The challenge is set up with several exercises set around the technical goals the adversary is trying to achieve (ATT&CK™ Tactics), for example, Initial Access, Persistence, Privilege Escalation, Command and Control. Participants will be asked to detect any techniques being used by an adversary to achieve these goals.
In this Fast Track attendees will gain hands-on experience developing and understanding the analytics needed to discover the techniques used by adversaries during a cyber security breach.
Participants who attend this workshop will learn how to:
- What is the MITRE ATT&CK framework and how it can be used
- What are the TTPs that threat Actor’s use to carry out a breach
- Use FortiEDR Threat Hunting capabilities to uncover threats on the network
- Use FortiSIEM analytics to discovery attacker behavior based on attack techniques
- Use FortiDecepter to find attacker activity and shorten attacker dwell time
||Half-day technical workshop
||Provide a compelling, hands-on experience developing and understanding the analytics needed to discover the techniques used by adversaries during a cyber security breach.